Paper 2015/511

Near Collision Side Channel Attacks

Baris Ege, Thomas Eisenbarth, and Lejla Batina

Abstract

Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar while not identical leakage. We show how such knowledge can be exploited to mount a key recovery attack. The presented approach has several desirable features when compared to other state-of-the-art collision attacks: Near collision attacks are truly univariate. They have low requirements on the leakage functions, since they work well for leakages that are linear in the bits of the targeted intermediate state. They are applicable in the presence of masking countermeasures if there exist distinguishable leakages, as in the case of leakage squeezing. Results are backed up by a broad range of simulations for unprotected and masked implementations, as well as an analysis of the measurement set provided by DPA Contest v4.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Side channel collision attackleakage squeezingdifferential power analysis
Contact author(s)
b ege @ cs ru nl
History
2015-06-09: revised
2015-05-27: received
See all versions
Short URL
https://ia.cr/2015/511
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/511,
      author = {Baris Ege and Thomas Eisenbarth and Lejla Batina},
      title = {Near Collision Side Channel Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2015/511},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/511}},
      url = {https://eprint.iacr.org/2015/511}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.